Write three Discussions (each 1 to 2 pages)

User Generated

uryyb_qvc

Science

Description

Write three discussions, all three must be totally different and unique, don’t need any cover or front pages but include at least two references with APA format

Read the instructions very carefully before you start. Instructions are given below:

Week 1 discussion deals with systems and its vulnerabilities. A computer system is defined as: A system of interconnected computers that share a central storage system and various peripheral devices such as printers, scanners, or routers. Each computer may contain an operating system so that it can either operate independently or in conjunction with other computers. Based on the definition above please provide an example of a system, a system that you may have used before. Please answer the following based on your example:

  • The Common Vulnerabilities and Exposures (CVE) database is available for researching vulnerabilities that have been identified and categorized in a system. Use the CVE database to search for your example and identify any recent (within 6 months) vulnerabilities that may exist.
  • Additionally, research the vendor of the system to identify any solutions or fixes that may have been noted for the vulnerability identified. Please list your system and the vulnerabilities discovered for that system.
- Based on your research, you should also provide some comments on your findings.

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached.

1

Systems and Its Vulnerabilities
Although there are continuous improvements in the computer industry which have led to
the development of more unique and innovative computer systems such as the laptops and
Palmtops, the use of desktop is still common and widely used by many people and individuals.
Different vulnerabilities have always compromised this computer system's performance. The
Buffer Overflow is indeed one of the most common vulnerabilities which have been around for
many years and is still proving to be much stronger. Currently, different cybercriminals are still
naming and considering it as their default tactic because of the many numbers of vulnerable
internet applications (Solomon, 2015).
Man in the middle (MITM) is another vulnerability which the desktop computers are
likely to experience. The attack occurs typically when cybercriminal positions himself in
communication or conversation between the desktop user and the application by either
impersonating or even eavesdrop one of the parties and make everything to appear as if a normal
communication exchange is underway. Failure to consider this vulnerability, the user may lose
his or her personal information and data such as security passwords, important account details
along with the credit card numbers (Us.norton.com, n.d.). This information can be utilized for
different goals including identity theft and fund transfers.
HP Inc. being one of the vendors of the desktop computers and other computer systems,
should adopt appropriate mechanisms for mitigating these vulnerabilities. For instance, in fixing
the man in the middle attach or vulnerability, the company shoul...


Anonymous
Really helpful material, saved me a great deal of time.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Related Tags